General

  • Target

    6daefa03bac6f80c33e4fa528701eb835b95b5b08fa25d8cd850920985f0075f

  • Size

    708KB

  • Sample

    240527-spjrdahg28

  • MD5

    14e67f5df8662b3af5f1ec1fc43003cb

  • SHA1

    afae3b9e8fdb97e344e3c0dcad6bf9c17c5ab20b

  • SHA256

    6daefa03bac6f80c33e4fa528701eb835b95b5b08fa25d8cd850920985f0075f

  • SHA512

    6ae110d12ba23424b8ea4de9186066d1b2acf9369814a04774f441ee1af918b1264b53d56725c0d47db9e7375bfc4a373e281d3aeb59828b5863ff08e59db500

  • SSDEEP

    12288:U1quIhcT8w6/chae8P6gU2vXC1ixQo0/QQlYY/q/UE:U1qL88w688PGM67eY/q/UE

Score
7/10

Malware Config

Targets

    • Target

      6daefa03bac6f80c33e4fa528701eb835b95b5b08fa25d8cd850920985f0075f

    • Size

      708KB

    • MD5

      14e67f5df8662b3af5f1ec1fc43003cb

    • SHA1

      afae3b9e8fdb97e344e3c0dcad6bf9c17c5ab20b

    • SHA256

      6daefa03bac6f80c33e4fa528701eb835b95b5b08fa25d8cd850920985f0075f

    • SHA512

      6ae110d12ba23424b8ea4de9186066d1b2acf9369814a04774f441ee1af918b1264b53d56725c0d47db9e7375bfc4a373e281d3aeb59828b5863ff08e59db500

    • SSDEEP

      12288:U1quIhcT8w6/chae8P6gU2vXC1ixQo0/QQlYY/q/UE:U1qL88w688PGM67eY/q/UE

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks